Out-of-Bounds Affecting bind-utils package, versions <32:9.8.2-0.23.rc1.32.amzn1


Severity

Recommended
medium

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
64.39% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN201803-BINDUTILS-1672189
  • published27 Sept 2021
  • disclosed14 Jan 2014

Introduced: 14 Jan 2014

CVE-2014-0591  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2018.03 bind-utils to version 32:9.8.2-0.23.rc1.32.amzn1 or higher.
This issue was patched in ALAS-2014-287.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bind-utils package and not the bind-utils package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.

The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.

References

CVSS Scores

version 3.1